2015 IEEE International Conference on Computer Vision (ICCV) 2015
DOI: 10.1109/iccv.2015.476
|View full text |Cite
|
Sign up to set email alerts
|

An NMF Perspective on Binary Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(22 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…where S v and Z v are vector forms of S and Z, respectively; M is a constant binary matrix; I is identity matrix; ⊗ is Kronecker product [11]. The differences between our AL, SDR approaches and two above approaches of [11] are quite clear.…”
Section: Relationship To Existing Methodsmentioning
confidence: 97%
See 4 more Smart Citations
“…where S v and Z v are vector forms of S and Z, respectively; M is a constant binary matrix; I is identity matrix; ⊗ is Kronecker product [11]. The differences between our AL, SDR approaches and two above approaches of [11] are quite clear.…”
Section: Relationship To Existing Methodsmentioning
confidence: 97%
“…Our work is inspired by a few recent supervised hashing methods [15,16] and unsupervised hashing method [11] which rely on two-step approach to reduce the complexity of the coupled problem and to make the flexibility in using of different types of hash functions. In particular, those works decompose the learning of hash functions under binary constraint into two steps: the binary code inference step and the hash function learning step.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations